Explore by Topic

Johns Hopkins IT adds new layer of security to websites, services

ByHub staff report

/Published
March 19, 2018

Johns Hopkins Information Technology has a team in place this summer to help faculty and staff add an important layer of security to their cyber activities.

The Enterprise Authentication team will be reaching out by email to employees who have not yet signed up to access a myIT login code. This code, part of an overall security approach called multifactor authentication, will be needed in addition to a JHED ID and password to access some Johns Hopkins sites and services.

Darren Lacey, chief information security officer, is asking employees to be on the lookout for the email, which will come from JH-MyITLoginCode@jhu.edu. It will be addressed to individuals by name and will introduce a representative of IT@JH. The email will include instructions and contact information for any questions.

Unlike a traditional password, the myIT login code continually changes. Once users are registered, they need to open an authenticator app on their computer or mobile phone to see what the code is at that moment and enter it on the site's login page.

Many employees have already begun using a myIT login code to access the Johns Hopkins network from offsite through the virtual private network (VPN) or when signing in to Employee Self Service (ESS), Cloudapps for Epic, or MyCloud Desktop.

"Our goal is for every employee to be prepared to use a myIT login code so we can add it as a layer of protection for more programs and services," said Lacey and Stephanie Reel, CIO and vice provost for IT, in an email to employees.

Faculty and staff who would like to go ahead and enroll on their own will find instructions and videos on the Information Technology website. Individuals who have questions or need assistance can email the IT team at JH-myITLoginCode@jhu.edu.

"As cyberattacks on businesses and organizations have become widespread, it is a top priority for Johns Hopkins to make our data and systems as secure as possible," Lacey and Reel said. "Everyone in our organization plays a role in making sure our information and networks are protected, and we appreciate employees' efforts in implementing this important level of security."